Claim Missing Document
Check
Articles

Found 4 Documents
Search

Analisis Keamanan dan Kenyamanan pada Cloud Computing Dwina Satrinia; Syifa Nurgaida Yutia; Iik Muhamad Malik Matin
Journal of Informatics and Communication Technology (JICT) Vol 4 No 1 (2022)
Publisher : PPM Institut Teknologi Telkom Telkom Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52661/j_ict.v4i1.111

Abstract

Cloud computing atau ‘komputasi awan’ menyajikan berbagai kemudahan untuk organisasi maupun individu dalam mengakses data dimanapun dan kapanpun. Cloud computing memiliki kelebihan seperti memberikan berbagai pilihan model layanan, jenis penyimpanan data, serta kustomisasi komputasi sehingga memberikan manfaat yang menarik yaitu efisiensi, efektif dan hemat biaya, tetapi hal tersebut tidak membuat cloud computing aman dari ancaman serangan keamanan. Konsep keamanan dibutuhkan untuk membantu manajemen pada organisasi maupun individu dalam melindungi dan melakukan pengamanan data pada layanan cloud. Selain itu, model kenyamanan juga diperlukan untuk membantu pengguna dalam menggunakan layanan cloud.
Analisis Keamanan dan Kenyamanan pada Cloud Computing Dwina Satrinia; Syifa Nurgaida Yutia; Iik Muhamad Malik Matin
Journal of Informatics and Communication Technology (JICT) Vol. 4 No. 1 (2022)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52661/j_ict.v4i1.111

Abstract

Cloud computing atau ‘komputasi awan’ menyajikan berbagai kemudahan untuk organisasi maupun individu dalam mengakses data dimanapun dan kapanpun. Cloud computing memiliki kelebihan seperti memberikan berbagai pilihan model layanan, jenis penyimpanan data, serta kustomisasi komputasi sehingga memberikan manfaat yang menarik yaitu efisiensi, efektif dan hemat biaya, tetapi hal tersebut tidak membuat cloud computing aman dari ancaman serangan keamanan. Konsep keamanan dibutuhkan untuk membantu manajemen pada organisasi maupun individu dalam melindungi dan melakukan pengamanan data pada layanan cloud. Selain itu, model kenyamanan juga diperlukan untuk membantu pengguna dalam menggunakan layanan cloud.
Impact of Hyperparameter Optimizer for Image Malware Detection Iik Muhamad Malik Matin
International Conference on Education, Science, Technology and Health (ICONESTH) 2024: The 2nd ICONESTH
Publisher : International Conference on Education, Science, Technology and Health (ICONESTH)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46244/iconesth.vi.367

Abstract

Image-based malware detection has become an area of further research in dealing with image-based malware attacks. Various deep learning models have been used to improve detection accuracy. One popular architecture is VGG16, a convolutional network widely used in image classification. In this study, we explore the impact of hyperparameter tuning on the optimization of the VGG16 model for image-based malware detection. The hyperparameter experiments conducted in this study are optimizer, and the number of epochs. Through 6 experiments with parameter variations, we evaluate the performance of the VGG16 model using several SGD, and Adam optimizers and the number of epochs consisting of 100, 250 and 500 epochs. The experimental results show that the selection and tuning of the optimizer can affect the performance of the model in terms of accuracy and training efficiency. The optimized Adam optimizer gives the best results, with higher detection accuracy than the SGD optimizer. The results show that the Adam optimizer has the highest accuracy reaching 85%.
Sistem Monitoring Keamanan Pada Data Center Berbasis Security Information And Event Management (Siem) Dengan Wazuh dan IDS Iik Muhamad Malik Matin; Fadhilrahman; Asep Kurniawan; Ayu Rosyida Zain; Maria Agustin
Journal of Innovative and Creativity Vol. 5 No. 1 (2025)
Publisher : Fakultas Ilmu Pendidikan Universitas Pahlawan Tuanku Tambusai

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31004/joecy.v5i1.1761

Abstract

A data center is a center for managing, storing and processing important data which includes sensitive information, business applications and technology infrastructure. Due to the importance of data centers in supporting organizational operations, their vulnerability to information security threats such as cyber attacks, unauthorized access has a serious impact on daily operations. The implementation of IDS is currently not optimal because in-depth analysis is difficult and requires experts to observe it. For this reason, an effective security monitoring system is needed on an Intrusion Detection System (IDS) based on Security Information and Event Management (SIEM) using the Wazuh platform. IDS plays an important role in detecting network security threats, while SIEM provides the ability to integrate and analyze security data from various sources. This research designs and implements Wazuh integration with SIEM to strengthen detection and response capabilities against security threats. Experimental methodology is used to evaluate the performance of the developed system, with a focus on intrusion detection, log analysis and security event management. The research results show that the integration of Wazuh with SIEM provides significant improvements in monitoring capabilities and response to security threats, which will be a valuable contribution in ensuring the security of networks and sensitive data.